Browse Items (626 total)

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
This document is the NSA WikiInfo page for the decryption tool POISIONNUT - a "complex element responisble for scheduling ESP attacks." ESP stands for Encapsulating Security Payload - a tool for encrypting web traffic.

20140825-Intercept-ICREACH-Wholesale-Sharing.pdf
This document is a NSA memo giving a brief overview of the development, implementation, and status of the NSA's ICREACH program, which gives the US intelligence community and its Five Eye second-party partners access to a mass collection of…

20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf
This document is an internal NSA memo detailing the relationships existing between the NSA and the German BND (Federal Intelligence Service) and BfV (Office for the Protection of the Constitution). Various collaborative projects are described,…

20140519-intercept-sso_mystic_charts.pdf
This document contains slides from a progress presentation on the MYSTIC audio surveillance program. Slides include one example of information collected on a specific target, as well as bar graphs displaying the weekly data reports collected for many…

20130909-spiegel-smartphones (1).pdf
This document is a slideshow describing elements of the NSA's Smartphone surveillance programs. The presentation illustrates methods in which the NSA uses location data from iPhone smartphones to assist in surveillance of foreign targets.

20140519-intercept-somalget.pdf
This document contains a memo from an NSA official detailing the success of the SOMALGET program, which collects and holds bulk (full-take) audio data for up to 30 days. The memo refers to operations in Bahamas and one other redacted country.

20140430-intercept-prism_olympics.pdf
This document is a presentaion slide prepared by NSA Special Source Operations, detailing the training and approval for PRISM access granted to 100 GCHQ users during the 2012 Olympics and the status of the collection as of 24 May 2012.

20150219-Intercept-PCS Harvesting At Scale.pdf
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…

20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
This document is a NSA WikiInfo page for the VPN Transform Engine Emulator, which helps in VPN exploitation.

20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
This document contains presentation slides prepared by GCHQ's Joint Threat Intelligence Research Group for the 2010 SIGDEV conference. They describe existing operations such as ROYAL CONCIERGE, an operation focused on exploiting hotel reservation…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2